News has broken that up to 400,000 customers were at risk of critical flaw that could have given an attacker control over their home Wi-Fi network. IT security experts commented below.
Christopher Littlejohns, EMEA Engineer at Synopsys:
“In this particular case, root access – hence the ability to take over the device and use it for many nefarious purposes. These types of issues arise out of poor or absent requirements, secure software development policies, development practises and verification approaches. These days, It is usually quite simple to detect and fix this type of vulnerability during the development stage of the software, typically using human code reviews and automated solutions such as Static Analysis (SAST).
“Unfortunately product developers have a great deal to do to apply the best practices both the development of new products, but also detecting legacy product issues which have their origin in code that may have been developed many years ago. There is clearly a vast amount of vulnerable software in legacy products created well before the current level of criminality targeting connected devices. It will take many years for organisations to pay off this debt, in fact it is more likely that the devices become obsolete and are discarded than the security holes in them are fixed during their useful lifetime.”
James Brown, Global Vice President, Technology Solutions at Alert Logic:
The opinions expressed in this post belongs to the individual contributors and do not necessarily reflect the views of Information Security Buzz.